Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information Leakage
biblio
Information Theoretic Security over α-µ/α-µ Composite Multipath Fading Channel
Submitted by grigby1 on Tue, 06/02/2020 - 11:53am
secrecy matrices
policy-based governance
probability
pubcrawl
Receivers
resilience
Resiliency
Scalability
secrecy
non-zero secrecy capacity
secure outage probability
security
shadowing
Signal to noise ratio
telecommunication security
wireless channel
Wireless communication
α-μ distribution
Human Factors
channel capacity
channel parameters
Communication system security
composite multipath fading channel
confidential information
eavesdropper
fading channels
Human behavior
Capacity planning
Information Leakage
information theoretic security
mathematical expressions
Metrics
Monte Carlo methods
Monte-Carlo simulations
multipath channels
multipath fading
biblio
A Benchmark Suite of Hardware Trojans for On-Chip Networks
Submitted by grigby1 on Fri, 05/15/2020 - 12:45pm
Information Leakage
Trojan horses
system-on-chip
standards
side channel analysis
security
Routing
performance degradation
on-chip networks
NoC
network-on-chip
multiprocessing systems
multicore systems
manycore systems
invasive software
network on chip security
HT defense methods
Hardware Trojans
hardware trojan
Hardware
Functional testing
Cryptography
benchmarks
Benchmark testing
benchmark suite
Metrics
Resiliency
resilience
Scalability
biblio
Privacy Protection Scheme in Smart Grid Using Rechargeable Battery
Submitted by grigby1 on Mon, 03/09/2020 - 2:57pm
Scalability
Metrics
policy-based governance
privacy
privacy protection scheme
pubcrawl
rechargeable battery
resilience
Resiliency
Information Leakage
secondary cells
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
smart power grids
statistical methods
user privacy
electrical power
automation
batteries
battery power information
collaboration
composability
data privacy
Educational institutions
electrical load information
Abstracts
Electronic mail
energy consumption
heuristic algorithm
home energy use information
home network
Human behavior
Human Factors
biblio
Examining Leakage of Access Counts in ORAM Constructions
Submitted by grigby1 on Mon, 12/16/2019 - 3:54pm
Control Theory
Cyber Physical System
cyber physical systems
Database Security
Human behavior
Information Leakage
number of accesses
Oblivious RAM
privacy
pubcrawl
resilience
Resiliency
Scalability
biblio
Dummy Traffic Generation to Limit Timing Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
hidden communication
timing channel
timing
telecommunication traffic
security policy
Scalability
resilience
Receivers
IP timing covert channels
IP networks
Information Leakage
hidden transmit information
Bandwidth
Entropy
dummy traffic generation
dummy traffic
Cybersecurity
covert channels
covert channel capacity formula
covert channel
computer network security
Compositionality
channel capacity
biblio
Secure Out-of-Band Remote Management of Virtual Machines with Transparent Passthrough
Submitted by grigby1 on Thu, 01/31/2019 - 12:26pm
composability
Cryptography
cyber physical systems
Information Leakage
Nested virtualization
pubcrawl
Remote management
Resiliency
virtual machine security
virtual machines
Virtualized systems
biblio
High Security Orthogonal Factorized Channel Scrambling Scheme with Location Information Embedded for MIMO-Based VLC System
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Scalability
OFCS-LIE
OFCS-LIE scheme
optical transmitters
orthogonal error
physical layer security
pubcrawl
Receivers
Reliability
resilience
Resiliency
resultant OFCS-LIE matrix
multiple-output channels
secrecy capacity
security
system security
system security analysis
telecommunication security
visible light beam
Visible Light Communications Security
visible light communication system confidentiality
visible light communication system privacy
wireless channels
Iterative methods
channel capacity
counterpart scrambling scheme
Cryptography
eavesdropper
free-space optical communication
high security orthogonal factorized channel scrambling scheme
Information Leakage
information transmission reliability
information transmission security
iteration number
Adaptive optics
iterative orthogonal factorization method
LIE matrix factorization
light emitting diodes
location information embedded matrix
Matrix decomposition
Metrics
MIMO-based VLC system
MIMO channels
MIMO communication
multiple-input
biblio
From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality
Submitted by grigby1 on Mon, 11/19/2018 - 12:13pm
augmented reality
EMG side-channel
Human behavior
Information Leakage
keystroke detection
pin sequence inference
privacy
pubcrawl
resilience
Resiliency
Scalability
biblio
A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
resilience
network security
cyber-physical systems
pubcrawl
Scalability
digital signatures
Information Leakage
network protocols
censorship circumvention
Data Exfiltration
ed25519
eddsa
Information hiding
subliminal channels
biblio
Securing Concurrent Lazy Programs Against Information Leakage
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
information-flow control tools
concurrency control
Agda proof assistant
concurrent lazy programs security
covert channel
functional languages
functional programming
Haskell libraries
IFC libraries
IFC tools
Information Leakage
lazy calculus
lazy evaluation
lazy languages
lazyDup
Message systems
noninterference
security library MAC
software libraries
Writing
data structures
Theorem Proving
Haskell
Concurrency
cyber-physical systems
pubcrawl
composability
security of data
data privacy
Sensitivity
security
program diagnostics
resilience
Metrics
Libraries
Lattices
timing
Resiliency
software tools
« first
‹ previous
1
2
3
4
next ›
last »